Reed Elsevier

Displaying 1-40 of 917 results

  • White Papers // Feb 2015

    Characterization of the Windows Kernel Version Variability for Accurate Memory Analysis

    Memory analysis is an established technique for malware analysis and is increasingly used for incident response. However, in most incident response situations, the responder often has no control over the precise version of the operating system that must be responded to. It is therefore critical to ensure that memory analysis...

    Provided By Reed Elsevier

  • White Papers // Oct 2014

    Multi Core SSL/TLS Security Processor Architecture Prototype Design with Automated Preferential Algorithm in FPGA

    In this paper, a pipelined architecture of a high speed Network Security Processor (NSP) for SSL/TLS protocol is implemented on a System-on-Chip (SoC) where hardware information of all encryption, hashing and key exchange algorithms are stored in flash memory in terms of bit files, in contrary to related works where...

    Provided By Reed Elsevier

  • White Papers // Sep 2014

    Using Quantum Key Distribution for Cryptographic Purposes: Asurvey

    "The appealing feature of Quantum Key Distribution (QKD), from a cryptographic viewpoint, is the ability to prove the Information-Theoretic Security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in...

    Provided By Reed Elsevier

  • White Papers // Sep 2014

    Quality Management of B2C e-Commerce Service Based on Human Factors Engineering

    In this paper, the authors investigate Business-To-Customer (B2C) electronic commerce services from a quality management perspective. They propose a novel quality management approach that is based on human factors engineering to manage e-commerce service quality and operate according to customer needs. First, they screen credible quality requirements and determine their...

    Provided By Reed Elsevier

  • White Papers // Sep 2014

    Rank B2C e-Commerce Websites in e-Alliance Based on AHP and Fuzzy TOPSIS

    E-alliance is the union of e-commerce and its success and efficiency is related to comprehensive quality of e-commerce. Thus, ranking e-commerce websites in e-alliance is of importance, which is a Multi-Criteria Decision-Making (MCDM) problem. This paper proposes an evaluation model based on Analytic Hierarchy Process (AHP), fuzzy sets and Technique...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Measuring the Impact of JellyFish Attack on the Performance of Mobile Ad Hoc Networks Using AODV Protocol

    "MANETs are susceptible to various attacks. Out of which Denial of Service (DoS) are most dangerous and very difficult to detect and defend. Jellyfish is a new DoS attack categorized as JF reorder attack, JF periodic dropping attack and JF Delay variance attack. In JF delay variance attack, a JF...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Design of High Speed Reconfigurable Coprocessor for Next Generation Scrambler and De-Scrambler System

    In this paper, the authors present the high speed Reconfigurable Co-processor for scrambler and de-scrambler system. In a communication system more number of data will be transmitted through a media that transmitted data will be more secure and authenticated. with the help of scrambler device a some unknown data to...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Dynamic Clustering to Detect Malicious Nodes in Wireless Sensor Network

    "Wireless sensor networks are vulnerable to many types of attacks that disturb the normal behavior of the network. These attacks occur because of the presence of malicious nodes in the network that advertise false information among the nodes and disrupt normal operations of the network. This paper proposes a mechanism...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Approaches to Parallelization of NLP Tasks in a Search System

    "The large web expanding every moment poses at least three important challenges - scale (processing of enormous amounts of data), processing speed, and relevance (ability to extract relevant information). Research in information extraction and search systems strive to handle one or more of these challenges. A key element in all...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    A Comprehensive Analysis of Requirement Engineering Approaches in a Data Warehouse Environment

    "Data warehouses contain vast amount of data generated from different sources. In order to maintain data in the data warehouse according to the organization some designing approaches are important. In data warehouse systems, Requirement Engineering (RE) is a crucial part of the software development process. Requirement engineering is a sub...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Adopting Dendritic Cell Algorithm to Conform a Hybrid Intrusion Detection System

    Artificial Immune System (AIS) is applied to hybrid Intrusion Detection System (IDS). A hybrid IDS is inspired by the concept of danger theory of human immune system is proposed in this paper and works for both host as well as network. The idea behind this hybrid IDS is based on...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Template-Based Human Detection and Feature-Based Tracking

    "Automatic video surveillance is seeing widespread use in the remote monitoring of people. When the authors are dealing with automatic video surveillance, classification of detected objects and tracking them are the most crucial processes. This paper proposes a human tracking system for static background, which first classifies all incoming objects...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    A Framework for Evaluating Web Service Based on Threat Patterns

    "The authors present a new methodology for web service to address the security issues and proposed a new computation technique which optimizes complex problem into smaller sub problems that can be solved more efficiently. In this paper, they present a study on vulnerability scanners to detect security vulnerabilities in publicly...

    Provided By Reed Elsevier

  • White Papers // Jan 2014

    Video Surveillance System for Security Applications

    "Computer Vision (CV), or image understanding, seeks to replace human interpretation with computer-based interpretation. Computer Vision deals with the automatic analysis, reconstruction, and recognition of objects in a scene from one or more images. Basically a video surveillance system deals with detection of unusual motion. The efficiency of video surveillance...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Evolvable Hardware: A Synthesis and Analysis Using Different Evolutionary Strategies

    In this paper, Cartesian genetic algorithm with evolutionary strategies are used to synthesize digital circuits like full adder and 2 bit multiplier, constructed with only universal gates. The fitness function and different crossover techniques are also such used that minimum gates are utilized. The Genetic Algorithms (GA) with evolutionary strategies...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Cryptanalysis of a Chaotic Neural Network Based Chaotic Cipher

    "The rapid development of multimedia and network technology has promoted the use of digital images and videos being transmitted over internet and wireless network more and more frequently. So the security of digital images and videos is needed in many applications. Recently a triple key encryption method based on logistic...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Security Solution to Protect SCADA Systems from Cyber Attacks

    "Supervisory Control And Data Acquisition (SCADA) systems, control and monitor utility infrastructure, such as electricity, gas, water etc, which happen to be part of critical infrastructure. Existing SCADA systems were originally designed for reliability. Initial SCADA systems used proprietary protocols like Modbus, DNP3 to access sensed data and initiate supervisory...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    End-to-End QoS Mapping Between UMTS and WiMAX in Loose Coupling Heterogeneous Wireless Network

    "One of the main objectives of Heterogeneous Wireless Access Networks (HWANs) is to integrate the different wireless access technologies, such as UMTS, WiMAX and WLAN, with a common IP-based network in order to offer mobile users continuous and unified service in a transparent way. However, one of the major issues...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Object Oriented Approach to Anatomy of Intrusion Detection System

    "Now-a-days intrusions become more increased in individual systems, so activities in a system must be observed by scanning and it must be saved for future use. If any discrepancy is found from observed behavior then a report must be generated to help red teams. The central idea of the authors'...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Congestion Control for Computer Networks Using Weighted Random Early Detection (WRED)

    "Computer network is a set of computers and hardware components linked together to communicate with each other. Congestion in networks occurs when at any node there is more data traffic than the outgoing link capacity. Effects of congestion are packet delay, packet drop, reduced system throughput and degraded quality of...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Stability History Based Route Selection Using K-Means Clustering in Mobile Adhoc Networks

    "In Mobile Ad-hoc NETworks (MANETs) there is no fixed communication infrastructure, so it allows more flexible model of communication than traditional networks. For any active connection in such a networks, the end hosts as well as the intermediate nodes, which relay the information, can be mobile. Because of this dynamic...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Optimized

    "A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes in which different routing protocols are used to form the communication network. So, far there are numerous routing protocols are discovered in which AODV performs superior than all. Ad-hoc network suffer from the bunch of issues in which...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Augmenting Naïve Bayes Classifier With Domain Knowledge in Detecting Malware

    "Malicious software attacks on the Internet are on the rise in both frequency and sophistication. The use of Naïve Bayes technique has been shown to be capable to detect malware. This paper proposes the usage of domain knowledge in the algorithm to improve detection accuracy. The domain knowledge consists of...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Enhanced Security Framework for Cloud Computing

    "Cloud computing provides large scale pool of resources, wide access, dynamicity, cost effective solution for storage. Public, private and hybrid deployment models exist for cloud computing along with various service models like integration as service, database as service, and security as service. Though cloud computing is being adopted as the...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Impact of MAC Protocol Over the Performance of Routing Protocol in MANET

    "MANET is an unstructured network formed dynamically between a set of mobile nodes. Routing is a challenge for this network due to its dynamic topology as well as resource constraints. Many routing and MAC layer protocols have been proposed in the network history and most of the researches are under...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Mobile Ad Hoc Network Research Areas : A Step Ahead

    "A Mobile Ad-hoc NETworks (MANETs) is a collection of mobile nodes that dynamically self organize in a wireless network without using any preexisting infrastructure. In a MANET, the applications are typically ""Peer-to-peer"" rather than ""Client-server"". In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    TCP-P: A New Approach in Wireless Environment to Solve Issues Currently TCP Facing

    "TCP is a reliable end-to-end protocol for transporting applications. TCP was originally designed for wired links where the bit error rate is really low and the authors assume that packet losses are due to congestion in the network. But TCP performance in wireless networks suffers from some significant issues like...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Secure Authentication Key Agreement Protocol for Long Term Evolution - Advanced

    "The Authentication and Key Agreement (AKA) protocol for Long Term Evolution-Advanced (LTE-A) which is proposed to solve the vulnerabilities found in previous communication systems such as 2G and 3G systems. They still contain the vulnerabilities like redirection and man-in-the-middle attack. They gave way to the eavesdroppers to utilize and misuse...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Reduction Fuzzy Data Set Based on Rough Accuracy Measure

    "Attribute reduction is very important in rough set because it used to simplify the induced decision rules without reducing the classification accuracy. In rough set theory, a reduct is generally defined as a minimal subset of attributes that can classify the same domain of objects as unambiguously as the original...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    A Comprehensive Study of Requirements for Network Applications and Routing Protocols Providing Resources in Vehicular AD HOC Networks

    "Vehicular ad hoc networks are special form of mobile ad hoc networks which have more dynamic topology than MANETs but the nodes move in a preordered fashion. Due to the high mobility and complex dynamics in real vehicular traffic flow, reliable streaming of data over vehicular ad hoc networks is...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Prediction of Peak Ground Acceleration (PGA) Using Artificial Neural Networks

    "In this paper, the probable range of the horizontal component of Peak Ground Acceleration (PGA) is predicted as a function of focal depth, earthquake magnitude and epicentral distance, using Artificial Neural Network (ANN). Three different ANN architectures (namely feed forward, back propagation and radial bias networks) are used to develop...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Trust Evaluation for Detecting Black Hole Attack on AODV Routing Protocol by Using Back Propagation Algorithm of Neural Network

    "A MANET consists of autonomous mobile nodes that are free to roam arbitrarily with no centralized controller such as a router to determine the communication paths. Each node in the ad hoc network has to rely on each other in order to forward packets. This kind of nature of MANET...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Mobile Embedded System for Advanced Weather Forecasting in Rural Area

    "City wise weather office is used for generating daily weather reports in present days. They study and report weather conditions from satellite images. But in reality, condition of weather keeps changing continuously, and, it takes time for these satellites to report the instant changes of weather. Thereby, most recent updates...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    An Efficient Hybrid Approach for Opportunistic Networks

    "Opportunistic network is next generation network of MANET. In opportunistic networks, route between mobile nodes never exits, mobile nodes communicate with each other once they notice chance to speak. Furthermore, nodes aren't alleged to possess or acquire any data regarding the constellation. Routes are engineered dynamically, whereas messages are route...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    "Emotion Recognition Using DWT, KL Transform and Neural Network"

    "Human face communicates important information about a person's emotional condition. In this paper, an approach for facial expression recognition using wavelet transform for feature extraction and neural network classifier for five basic emotions is proposed. The strength of the algorithm is the reduction in feature size and use of less...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Classification and Analysis on Routing Nodes in MANET Using Fuzzy Proximity Relation With Ordering and Formal Concept Analysis

    "Routing information plays a vital role in Mobile Ad-hoc NETwork (MANET). In MANET, each node maintains routing information that assists the routing process. Routing nodes and their routing attributes are essential in determining the performance of MANET. Thus, it is necessary to obtain knowledge on routing nodes and their attributes....

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    An Application of Hybrid ACL Approach in Cloud Environment

    "Cloud computing is a revolutionary way of representation of services to its end users. Main characteristic of cloud environment is a separation between data owner and data user. Due to this separation, data owner is totally unaware about the status of its data plus total number of access performed on...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    "A New Approach of Intrusion Detection System Using Clustering, Classification and Decision Table"

    "Intrusion Detection System (IDS) plays an important role to achieve higher security in finding or detecting malicious activities over network based as well as host based system for a couple of years. There are different types of intrusion detection system and anomaly intrusion detection is one of them. Currently this...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Traffic Based QoS Specific Adaptive Buffer Allocation in WiMAX Networks

    "Buffer allocation in WiMAX maximizes the throughput by achieving high link utilization of system and minimizes the power consumption. In this paper, traffic based QoS specific adaptive buffer allocation in WiMAX networks is proposed to increase the system throughput by using an adaptive buffer allocation strategy. The buffer management block...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Efficient Approach of Multimedia Transcoding for Streaming Over Mobile Devices

    "The proposed system introduces a novel framework that can optimize the bandwidth and maintain better visual qualities by performing transcoding on the multimedia contents mainly targeted over the mobile devices. The system designed in Matlab considers both image and video as input file and performs multimedia transcoding considering BMP, GIFF,...

    Provided By Reed Elsevier

  • White Papers // Feb 2004

    Organic Matter Adsorption on Montmorillonite Pillared b an Organophile Complex for Tangential Microfiltration Through a Zro2-Tio2 Inorganic Membrane

    Adsorption of organic matter (humic and fulvic acids) at 10 mg/l onto a montmorillonite combined pillared by ABPC and a cationic surface-active CTAB turns out to be comparable and even better than adsorption onto an active carbon under the same conditions. The efficiency reaches levels of 95%. On the other...

    Provided By Reed Elsevier

  • White Papers // Oct 2002

    Effects of Condylar Fibro-Cartilage on the Biomechanical Loading of the Human Temporomandibular Joint in a Three-Dimensional, Nonlinear Finite Element Model

    The present study was undertaken to test a hypothesis that the addition of articular fibro cartilage in the condyle of the temporomandibular joint reduces three-dimensional stress distribution in the condyle, the disc and articular eminence. A three-dimensional, nonlinear finite-element model was developed for analysis of joint loading before and after...

    Provided By Reed Elsevier

  • White Papers // Sep 2003

    Synthesis of Polysiloxane-Imide Membranes -Application to the Extraction of Organics From Water Mixtures

    The synthesis of new copolysiloxane-imide polymers was carried out from a, w-dimethylsiloxane oligomers and aromatic di-anhydrides (PMDA and 6FDA) to obtain soluble siloxane-imide based polymers (PSI) endowed both with organophile properties and good physical membrane properties. Synthesized PSI block copolymers had high weight contents of siloxane residue varying from 70...

    Provided By Reed Elsevier

  • White Papers // Sep 2001

    Discussion of Empirical Research on Accounting Choice

    This discussion considers four aspects of the survey paper on empirical accounting choice research: selection of an expansive definition of accounting choice and their decision to classify this research by managerial motives; decision to include implementation decisions in their definition of accounting choice; call for research on the consequences of...

    Provided By Reed Elsevier

  • White Papers // Feb 2001

    Saving of Energy and Cost in Seawater Desalination With Speed Controlled Pumps

    The paper describes for RO, MSF and MED plants the technical arrangement possibilities for speed control systems for small and large pumps and compares the energy consumption with conventional arrangements. It is demonstrated that for RO high pressure pumps speed control results always into an overall cost saving and for...

    Provided By Reed Elsevier

  • White Papers // May 2002

    Development of a Self-Consolidating Engineered Cementitious Composite Employing Electrosteric Dispersion/Stabilization

    A self-consolidating engineered cementitious composite (ECC) reinforced with hydrophobic polyethylene fibers has been developed by combining micromechanics based design and rheological design, in a compatible manner. The previously developed micromechanics based design selects material ingredients for tensile ductility in the hardened state. The rheological design, which the focus in this...

    Provided By Reed Elsevier

  • White Papers // Mar 2003

    Conducting a Sales Forecasting Audit

    Continuous improvement in sales forecasting is a worthy goal for any organization. This paper describes a methodology for conducting a sales forecasting audit, the goal of which is to help a company understand the status of its sales forecasting processes and identify ways to improve those processes. The methodology described...

    Provided By Reed Elsevier

  • White Papers // Jun 2004

    The Effect of Multi-Purpose Shopping on Pricing and Location Strategy for Grocery Stores

    Though it is a well-accepted fact that consumers indulge in multi-purpose shopping, most previous models of store choice assume that grocery shopping trips are single-purpose trips. This paper provides the first empirical analysis of multi-purpose shopping using data on actual shopping trips. A latent class factor analytic logit model is...

    Provided By Reed Elsevier

  • White Papers // Nov 2004

    Deciding When to Switch Tasks in Time - Critical Multitasking

    While cognitive modeling has begun to make good progress in accounting for human multitasking behavior, current models typically focus on externally-driven task switching in laboratory-task settings. In contrast, many real-world complex tasks, particularly time-critical ones, involve internally-driven multitasking in which people themselves decide when to switch between tasks. This paper...

    Provided By Reed Elsevier

  • White Papers // Apr 2005

    HR Drives Winning Formula

    Most engineers jump at the chance to work in the automotive industry. It is an opportunity to push their skills to the limit, as today's top-of-the-range cars use leading edge technology. This is particularly true in motor sports, where cars are required to perform at the highest level under extreme...

    Provided By Reed Elsevier

  • White Papers // Jul 2003

    A Good Samaritan is Hard to Find

    In Atcovitz v. Gulph Mills Tennis Club, the Pennsylvania Supreme Court affirmed the trial court's grant of summary judgment in favor of the defendant, a tennis club, holding that the club did not owe a duty to carry an Automated External Defibrillator (AED).

    Provided By Reed Elsevier

  • White Papers // Jul 2003

    Charging Plan Expenses to Participants

    Administering a qualified plan can be costly. As a way to minimize costs, plan administrators often try to shift some of the costs to plan participants. While ERISA precludes certain types of expenses from being charged back to participants, all other expenses can be charged to participants. With regard to...

    Provided By Reed Elsevier

  • White Papers // Jan 2003

    Brainstorming Your Way to a Winning Case Strategy

    Complexity obstructs effective thinking. They involve dozens of witnesses and organizations, hundreds of critical facts, and hundreds, if not thousands, of documents. Brainstorming sessions can help one deal with case complexity problems. Early in case preparation, brainstorming helps one flesh out the critical factual disputes and set goals for discovery....

    Provided By Reed Elsevier

  • White Papers // Jan 2003

    It?s Not Just About Injunctions Anymore: An Overview of Money Damages in Intellectual Property Litigation

    Litigation involving intellectual property (?IP?) is one of the fastest growing areas of litigation in the U.S. Based on federal court statistics, more than 7,700 patent, trademark, and copyright cases were be filed in the U.S. in 1999. This represents an increase of nearly 300% over the reported filings in...

    Provided By Reed Elsevier

  • White Papers // Jan 2003

    Am I My Company?s Alter Ego? Theories Of Alternative Liability For Debts To The Medicare Program

    This article is about the government?s focus on recovering improperly paid Medicare funds which has emphasized the use of the civil False Claims Act statute and (with less frequency) criminal statutes relating to false claims and statements. The reported cases included in the article are important because they confirm the...

    Provided By Reed Elsevier

  • White Papers // Jan 2003

    Valuation Effects of Bank Financing in Acquisitions

    In a sample of 115 cash tender offers between 1990 and 1996, banks extend financingin 70% of the tender offers and finance the entire tender offer in half of these takeovers. Bank financing of tender offers is more likely when internal cash reserves are low. Acquisitions that are entirely financed...

    Provided By Reed Elsevier

  • White Papers // Oct 2003

    An All-Star Team

    Because Foley & Lardner serves as outside counsel to Major League Baseball (MLB), the assumption might be that the firm's lead counsel, Mary Kay Braza, is a pinch hitter called on to get the key hit when MLB needs help but otherwise sits on the bench. While that might be...

    Provided By Reed Elsevier

  • Case Studies // Jul 2003

    Admissibility of Social Security and Workers' Compensation Payments Associated with Prior Accidents

    You are defending a typical automobile accident case. The plaintiff claims to have sustained injuries to his neck, upper back, lower back, and leg. The injuries are primarily soft tissue. Through discovery or investigation, you learn that the plaintiff sustained a back injury in a workplace accident several years before...

    Provided By Reed Elsevier

  • White Papers // Jan 2003

    Inheriting Contaminated Property: A Blessing Or A Curse?

    Too often, even seemingly ?clean? commercial properties have some environmental concerns. Moreover, because environmental laws have only been around for a few decades, the longer ago the property was being used for commercial purposes, the more likely it may be that it is contaminated. The question this article tries to...

    Provided By Reed Elsevier

  • White Papers // May 2003

    AIMR Trade Management (Best Execution) Guidelines

    This alert summarizes the final Guidelines as well as the significant changes that were made to the proposed Guidelines as a result of the comments received.

    Provided By Reed Elsevier

  • White Papers // Apr 2002

    New Advances in Polymer/ Layered Silicate Nanocomposites

    This review discusses some recent advances in polymer silicate Nan composites. In particular, we highlight the properties of specific Nan composites while emphasizing the lack of properties trade-offs in these systems. The paper also presents in detail the work on the structure and dynamics of the polymer/ nanofiller interface and...

    Provided By Reed Elsevier

  • White Papers // Dec 2003

    An fMRI Study of Semantic Processing in Men With Schizophrenia

    As a means toward understanding the neural bases of schizophrenic thought disturbance, we examined brain activation patterns in response to semantically and superficially encoded words in patients with schizophrenia. Nine male schizophrenic and 9 male control subjects were tested in a visual levels of processing (LOP) task first outside the...

    Provided By Reed Elsevier

  • White Papers // Feb 2001

    Volumetric Quantification of Brain Swelling After Hypobaric Hypoxia Exposure

    Conventional qualitative interpretation of two-dimensional cross-sectional MR images gives information about the localization and extension of edematous tissue in patients with brain edema. Changes in adjacent brain slices allow an approximate evaluation of the brain volume. Other approaches in characterization of brain edema are T2 mapping, diffusion weighted imaging, or...

    Provided By Reed Elsevier

  • White Papers // Feb 2002

    A Comparative Study on Aseismic Performances of Base Isolation Systems for Multi-Span Continuous Bridge

    The recommended ranges of the design parameters are presented in this study. The design parameters such as the first natural period of the isolated bridge and the friction coefficient of the bearing are determined by the reciprocal relationship between the peak deck displacement and the peak overturning moment of the...

    Provided By Reed Elsevier

  • Webcasts // May 2009

    Tapping Into the Power of Unified Communications Securely

    Unified Communications has become a powerful mainstream business resource, permitting rapid and cost-effective communication between internal and external staff alike. But, along with improved productivity, the use of Unified Communications software such as Microsoft Office Communications Server (OCS) has brought with it a new range of security threats that few...

    Provided By Reed Elsevier

  • White Papers // Sep 2009

    Effects of MDMA, Methamphetamine and Methylphenidate on Repeated Acquisition and Performance in Rats

    Repeated-acquisition procedures that include performance controls for effects not specific to acquisition permit the assessment of drug effects on learning on a within-subject, within-session basis. Despite the advantages of this methodology, few studies have examined effects of psychomotor stimulants on repeated acquisition in rodents. The purpose of the present paper...

    Provided By Reed Elsevier

  • White Papers // Sep 2010

    R-Code: Network Coding-Based Reliable Broadcast in Wireless Mesh Networks

    Broadcast is an important communication primitive in Wireless Mesh Networks (WMNs). Applications like network-wide software updates require reliable broadcast to ensure that every node in the network receives the information completely and correctly. With underlying unreliable wireless links, a key challenge in implementing reliable broadcast in WMNs is to achieve...

    Provided By Reed Elsevier

  • White Papers // Dec 2009

    An Architecture-Driven Software Mobility Framework

    Software architecture has been shown to provide an appropriate level of granularity for assessing a software system's quality attributes (e.g., performance and dependability). Similarly, previous research has adopted an architecture-centric approach to reasoning about and managing the run-time adaptation of software systems. For mobile and pervasive software systems, which are...

    Provided By Reed Elsevier

  • White Papers // Apr 2010

    ABS: Adaptive Buffer Sizing for Heterogeneous Networks

    Most existing criteria for sizing router buffers rely on explicit formulation of the relationship between buffer size and characteristics of Internet traffic. However, this is a non-trivial, if not impossible, task given that the number of flows, their individual RTTs, and congestion control methods, as well as flow responsiveness, are...

    Provided By Reed Elsevier

  • White Papers // Oct 2009

    Queuing Dynamics and Single-Link Stability of Delay-Based Window Congestion Control

    Accurate modeling of queuing dynamics is important in the design and analysis of Internet congestion control. However, as demonstrated in this paper, existing window-based queuing models are often not capable of precisely capturing the transient behavior (i.e., self-clocking and burstiness) of TCP-like protocols and their resulting analysis may be inaccurate...

    Provided By Reed Elsevier

  • White Papers // Jan 2011

    SPAN: A Software Power Analyzer for Multicore Computer Systems

    Understanding the power dissipation behavior of an application/workload is the key to writing power-efficient software and designing energy-efficient computer systems. Power modeling based on Performance Monitoring Counters (PMCs) is an effective approach to analyze and quantify power dissipation behaviors on a real computer system. One of the potential benefits is...

    Provided By Reed Elsevier

  • White Papers // Jun 2009

    The SocialTrust Framework for Trusted Social Information Management: Architecture and Algorithms

    Social information systems are a promising new paradigm for large-scale distributed information management, as evidenced by the success of large-scale information sharing communities, social media sites, and web-based social networks. But the increasing reliance on these social systems also places individuals and their computer systems at risk, creating opportunities for...

    Provided By Reed Elsevier

  • White Papers // Jun 2009

    MAC-Layer Proactive Mixing for Network Coding in Multi-Hop Wireless Networks

    Network coding is a recent research topic in wireless networking. By combining multiple packets in a single broadcast transmission, network coding can greatly improve the capacity of multi-hop wireless networks. Packet mixing, when applied with traditional routing, can only be performed at the junctions of the paths determined by the...

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    A Novel Analysis Space for Pointer Analysis and Its Application for Bug Finding

    The size of today's programs continues to grow, as does the number of bugs they contain. Testing alone is rarely able to flush out all bugs, and many lurk in difficult-to-test corner cases. An important alternative is static analysis, in which correctness properties of a program are checked without running...

    Provided By Reed Elsevier

  • White Papers // Jul 2010

    A Parallel Evolutionary Algorithm to Optimize Dynamic Memory Managers in Embedded Systems

    For the last 30 years, several Dynamic Memory Managers (DMMs) have been proposed. Such DMMs include first fit, best fit, segregated fit and buddy systems. Since the performance, memory usage and energy consumption of each DMM differs, software engineers often face difficult choices in selecting the most suitable approach for...

    Provided By Reed Elsevier

  • White Papers // Mar 2011

    Indoor Deployment of IEEE 802.11s Mesh Networks: Lessons and Guidelines

    Emerging Wireless Mesh Networks (WMNs) are known for their fast and low cost deployment. Conventional mesh deployment focuses on the outdoor environment, which regards the WMNs as backbone networks. This study deploys and measures indoor IEEE 802.11s mesh networks to extend WLAN capabilities with extensive experiment configurations. The testbed is...

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    Optimal Sensor Positioning for Large Scale Metrology Applications

    As it strongly affects the system performance in measuring 3D point coordinates, beacon positioning represents a challenging issue in large scale metrology applications based on wireless sensor networks. This paper presents a software-assisted procedure for efficient placement of ultrasonic beacons in a wireless distributed network-based system for medium - large...

    Provided By Reed Elsevier

  • White Papers // Jul 2010

    Reputation-Based Dependable Scheduling of Workflow Applications in Peer-to-Peer Grids

    Grids facilitate creation of wide-area collaborative environment for sharing computing or storage resources and various applications. Inter-connecting distributed Grid sites through peer-to-peer routing and information dissemination structure (also known as peer-to-peer Grids) is essential to avoid the problems of scheduling efficiency bottleneck and single point of failure in the centralized...

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    A Data Placement Strategy in Scientific Cloud Workflows

    In scientific cloud workflows, large amounts of application data need to be stored in distributed data centers. To effectively store these data, a data manager must intelligently select data centers in which these data will reside. This is, however, not the case for data which must have a fixed location....

    Provided By Reed Elsevier

  • White Papers // Sep 2010

    On-Demand Minimum Cost Benchmarking for Intermediate Dataset Storage in Scientific Cloud Workflow Systems

    Many scientific workflows are data intensive: large volumes of intermediate datasets are generated during their execution. Some valuable intermediate datasets need to be stored for sharing or reuse. Traditionally, they are selectively stored according to the system storage capacity, determined manually. As doing science on clouds has become popular nowadays,...

    Provided By Reed Elsevier